


Werner Sommerfeld
Werner grew up in Hamburg, Germany and witnessed firsthand the rise of Nazism. He was just 11 years old when his friend, Helmuth Hübener, became the youngest person executed as part of the German Nazi resistance.
At 95, Werner still stands for justice. A Ukrainian flag hangs in his window, a simple yet powerful protest against oppression. Inside his modest home, he recounted stories of resistance—of his mother’s friendship with Helmuth, of the Jewish man barred from his church, and of Helmuth’s final letter before his execution. Werner’s resilience is a reminder that having a backbone often comes at great personal cost.
In product security, we often face moments where we must choose between advocating for customers and staying silent. While the stakes are far from those Werner faced, the courage to act—even when it’s uncomfortable—is still essential.
Most security engineers know of at least one “skeleton in the closet.” Perhaps it’s an unencrypted database of customer data or a vulnerable legacy system. If customers knew about these issues, their trust would be destroyed. Advocating for improvements can be hard, especially when it might affect your career.
Unfortunately, history shows us that when people are uncertain how to respond to a challenging situation, they default to doing nothing. Here are three steps you can use to effectively advocate for your customers:
You don’t want to be perceived as “just being difficult.” Data provides an objective foundation for your argument. Metrics like these can support your case:
- Number of users impacted by a vulnerability.
- Historical costs of similar breaches (e.g., fines, downtime).
- Potential revenue impact due to sales pipeline and future revenue.
The most compelling evidence often comes from red team exercises that prove the exploitability of an issue. However, even strong data needs to be framed correctly.
Decision-makers prioritize business objectives. Translate security risks into financial, reputational, or operational impacts. Instead of saying, “This system is vulnerable,” explain, “This vulnerability could expose customer data, leading to regulatory fines of $X and damaging our ability to sign new clients.”
Document Everything: Follow up verbal discussions with email summaries. Stay professional and avoid snarky comment
Align With Allies: Partner with teams like Legal or Compliance, as they often share concerns about security risks and can help reinforce your case.
Seek Independent Legal Counsel: Company lawyers protect the organization, not necessarily you. Independent counsel ensures your rights are prioritized.
